October 24, 2019

Understanding Cloud and Security Challenges

Most organizations run on multi cloud environments, given the digital transformation that is taking place.  This broadly means that organizations decision to run enterprise applications in multiple cloud environments like public, private, or hybrid, and the decision to use a mix of cloud service providers, also this can involve multiple infrastructure as a service (IaaS) […]

Read More
October 21, 2019

Another victim falling prey to RANSOMWARE

Pitney Bowes was hit by ransomware on October 14th which made the customers unable to use their services like print labels, mailing, track parcels and manage expenses. This US-based mailing company was infected by the malware called Ransomware which locked the system using encryption and played havoc with the customer services. Currently, Pitney Bowes is working […]

Read More
October 17, 2019

Malicious apps soaring to unsafe heights

With the use of mobile applications thriving high like never before, Hackers seem to love creating a rogue application to steal the data. Threats are surfing at every domain and people tend to download fraudulent apps for their easy use, yet they momentarily forget about the cyberattack it causes. Legitimate apps are created and personal […]

Read More
October 9, 2019

How to reset the Forgotten root password in AWS-EC2 Instance

It is often found challenging or sometimes difficult to reset the forgotten root password in the AWS system. Administrators, and analysts have their task cut out already with deployments or overseeing smooth running of IT systems. The password reset methods in the AWS system is bit difficult and professionals find it time consuming to address […]

Read More
October 1, 2019

Identity and Access Management – Your first choice to Avoid a Data Breach

IAM is the first choice to avoid a data breach.  Many organizations and government agencies seem to ignore this fact completely or simply don’t give importance to it.  IAM is also termed access management or digital identity.  IAM is designed to define security policies and technologies ensuring that the right people in an organization, have […]

Read More
September 25, 2019

How to get API permission for Centrify Multi Factor Authentication (MFA)?

Most clients using Centrify tool find it challenging to get API permission authenticated for MFA. However, after much support from the Centrify teams, Sennovate started to follow the authentication process. The screen shot displayed below will help in starting the authentication process in postman which is the most popular tool used in API testing. 1. […]

Read More
September 21, 2019

Understanding Security Orchestration, Automation and Response (SOAR)

In today’s dynamic IT security landscape, rising security alerts and falling skills shortage is forcing IT decision-makers to look at suitable solutions. Deploying security orchestration, automation and response ( SOAR) is the best answer. The job of the SOAR platform is to identify all threats and automate response for as many of them as possible. […]

Read More
September 16, 2019

Cybersecurity in course curriculum – The Need of the Hour

It’s time we need to look at the cybersecurity to form part of the mainstream course curriculum. Majors like Computer science and allied courses should take this subject very seriously and include it. The need for this push is very much required as there are a huge talent and job gaps. It is roughly estimated […]

Read More
September 10, 2019

California Consumer Privacy Act (CCPA): What you need to know

In a bid to stop data privacy, data breaches and personal information getting compromised, the state of California, has decided to implement the California Consumer Privacy Act (CCPA), starting coming January, 2020.  This move will facilitate consumers at large and getting done away with a free access or unauthorised access of personal information. With a […]

Read More
September 5, 2019

How to Avoid a Data Breach

Government agencies are becoming prime targets for cyber attackers, they hold data for ransom. Whatever the rationale of the cyber attackers, it is imperative that government agencies need to pull up their socks to understand the gravity of the situation, Take the Baltimore data breach which occurred twice in less than a year. Large corporations […]

Read More
August 29, 2019

Sennovate Insights: Gartner Magic Quadrant in Access Management 2019

Technology providers are present worldwide, but to know who is the best among the vendors is a challenging task for analysts, and for organizations to choose, as each vendor offering will have some features same, some missing and some features added to their product offerings. So how do we figure out who are the leaders […]

Read More
August 26, 2019

Real ID-Compliant – A Must for all Residents

Starting October 1, 2020, every State and Territory Resident will need to present a REAL ID-compliant license/ID or another acceptable form of identification (like a passport or passport card) for boarding commercial aircraft.  This new compliance regulation is based on a law passed after 9/11. A single national standard for all 50 states is being […]

Read More